When it comes to our personal identification like birth certificates, social security cards, passports, photo IDs and financial records, we take precaution to keep this data out of the hands of thieves. We may lock up original copies, and use complex passwords for online portals. We may even make it a regular practice to frequently change passcodes when logging into public systems.
You want to take the same precautions to keep your company’s data secure. If you are in charge of choosing financial software for your business, you likely treat your customer’s information as if it were your own. It only makes sense, then, to select solutions from a company that takes security seriously—like Intacct.
As we explained in our article, Protect and Access: system security and uptime in the cloud Intacct has taken a variety of technological steps to ensure the physical aspects of your system are secure. This includes protecting physical servers and setting up back-ups and server redundancy.
What does Intacct do to keep your data secure in the cloud?
Recently, we touched on Intacct’s modification to its login process, to now require a 2-step verification in the article, How can Intacct protect your data? This is only one of the measures they have in place to ensure a high level of security.
Within Intacct, you can control sign-in settings so your users can access only the specific tasks they need. (Image 1) Further, this security model allows you to control your system access. You can also enforce password changes and automatic session timeouts.
Intacct also provides real-time activity log tracking. In the Access Log, you can view sign-in and sign-out times, including those you’ve set to auto log out. (Image 2) As an additional security level—you can set a predefined range of approved IP addresses from which users can access Intacct. This will prevent logins from unknown devices.
Tight security settings can allow you to restrict which tasks within Intacct your users can access, but sometimes you also need to see what data was added or edited and by whom and when. View the history of transactions by user in the Audit Log. (Image 3)
Blocking Unauthorized Systems and Users
What about blocking unauthorized systems and users? Intacct has put several security measures in place to prevent unauthorized users from accessing the system. This includes firewalls, anti-virus software and automated security scanning. Also, all customer data is transmitted with a minimum of 128-bit encryption.
Even more intensive security is provided through advanced Oracle database settings, biometric access controls to production data, and third party white hat penetration testing. Intacct is also SSAE 16 SOC1 Type II audited and PCI DSS certified.
Intacct’s Commitment to Protecting Customer Business Data
Intacct’s commitment to protecting customer business data and keeping systems up and running makes them a respected leader in the financial solutions market—and a key reason why we at MicroAccounting chose to partner with them. In today’s cloud and Internet-based business world, security is essential, and Intacct puts trusted security measures in place to let you focus on your company’s operations and success.
For further reading about security in the cloud, see our articles:
How can Intacct protect your data?
Contact MicroAccounting to learn more about how Intacct can keep your ERP data safe in the cloud.